We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

EBIT Technology Operations Center (TOC) Analyst

General Dynamics Electric Boat
United States, Connecticut, Groton
Oct 28, 2025

EBIT Technology Operations Center (TOC) Analyst





Requisition ID
2025-16462

Location
US-CT-Groton

Seat Location
EB Poheganut

Trade
Information Technology

Shift
1st

Security Clearance Required
Secret

Number of Openings
3



Overview

Electric Boat Information Technology (EB IT) is responsible for Electric Boat's enterprise and special use information systems, such as product design environments, collaboration platforms, and office productivity suites. EBIT supports over 20,000 end-users in a wide variety of work environments, networks and locations.

The EBIT Technology Operations Center (TOC) Analyst serves as the front-line guardian of enterprise technology systems, monitoring critical IT infrastructure and cloud environments in real-time. The TOC Analyst ensures operational continuity, rapid IT incident detection, and coordinated response across IT, network, and security domains.

This position serves as a bridge between the Network Operations (NOC), IT Service Management (ITSM) organization and the EB Cyber Security Operations (CSOC), providing unified visibility into system health, performance and IT incident management.

Key Responsibilities:

    Monitor enterprise IT systems, network performance, and system alerts via dashboards, telemetry and visibility tools.
  • Conduct real-time triage of events to identify service disruptions, performance degradation, and assist in the remediation for security incidents.
  • Strong understanding of Windows, Linux, and cloud (Azure, AWS, or OCI) environments.
  • Execute established runbooks and escalation protocols to resolve or route IT incidents to appropriate Tier 2/3 teams.
  • Maintain situational awareness dashboards displaying system performance and metrics, security status, and service health.
  • Collaborate with cybersecurity, network, and infrastructure teams to correlate alerts and coordinate IT incident response.
  • Manage and update tickets within ITSM platforms (e.g., ServiceNow, Jira, Confluence).
  • Support root-cause analysis, reporting, and post-incident review documentation.
  • Contribute to continuous improvement of operational monitoring, automation, and alert tuning.
  • Participate in 24x7 on-call rotation or shift schedule as required.


Qualifications

Required:

  • Bachelor's of Science Degree in Information Technology, Computer Science, Cybersecurity,
  • 5+ years in IT operations, network operations, or cybersecurity monitoring.
  • Experience using SIEM (e.g., Splunk, QRadar, Sentinel), network monitoring (Netbrain, Zabbix), and ITSM systems (ServiceNow), SCCM/INTUNE.
  • Must be able to obtain and maintain a Final DOD security clearance.
  • Occasional on-call or weekend work required during major IT incidents or maintenance windows.

Preferred:

  • CompTIA Security+, Network+, or CySA+
  • Familiarity with IT incident response procedures and ITIL/ITSM workflows.
  • Microsoft Certified: Security Operations Analyst Associate
  • ITIL v4 Foundations
  • CCNA or similar network certification


Skills

  • Excellent verbal and written communication skills with executive presence and strong customer service orientation.
  • Ability to handle high-pressure, time-sensitive situations with discretion and professionalism.


Physical Qualifications

Light Lifting


Environmental Attributes

Inside


Join our talent pools, get job alerts, and see EB news

We can recommend jobs specifically for you!
Click here to get started.
Applied = 0

(web-675dddd98f-24cnf)